Preview

Ipremier and Denial of Service Attaack

Satisfactory Essays
Open Document
Open Document
460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ipremier and Denial of Service Attaack
MEMORANDUM
To: Prof. Timothy Shea
From: Linda Cosme
Date: April 2, 2013
Subject: iPremier and Denial of Service Attack – Case Study
______________________________________________________________________________
The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.

The main problem for the company was that they didn’t have a plan of attack or set plan on how to deal with situations like these. Many of the employees and management were on the newer side and weren’t aware of any type of plan of action to take with an intruder attack. There was some type of “binder” for these situations that had contacts and steps but that it wasn’t really used and hadn’t been updated. Another problem was the resistance and lack of support they had with their collocation facility Qdata. They met resistance when trying to access the necessary equipment and didn’t get much support when they contacted the facility.

A good plan of attack would be to develop a business continuity plan and keep it updated to maintain the highest level of efficiency possible. The company should consider having better training in place for emergencies like this type and develop a clear line of communication hierarchy. This would allow these emergencies and issues to be communicated only to those individuals necessary

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Unit 11 P4 Answers

    • 1172 Words
    • 5 Pages

    Fire Fighting- if possible extinguish yourself or get another member of staff to back you up. Be aware of other hazards eg cleaning supplies, that could feed fire and if necessary evacuate building.…

    • 1172 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Meltdown at Jetblue

    • 394 Words
    • 2 Pages

    First, I would plan for the worst case scenario. My team of executives would be drilled to test the system, find the limitations, and then assign a team to deal with them. It is too late when the event is happening to plan for the scenario. I think as follow-up to the crisis, the plans were executed very well. I also would not plan to take a flight out on the runway when the weather is so bad. I would do almost anything to prevent them from being stranded on the tarmac. It is my opinion that I would make drastic IT changes, starting…

    • 394 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    With a good plan in place, we would also conduct the cost of each occurrence and the affect it would have financially. Mitigation plans are as good as we make them. With this mitigation plan the company may address the problems at hand. With all risks we have to take in consideration the impact it would have on our integrity, and confidentiality. The main risk would be an internal risk. Our staff may intentionally or unintentionally want to disrupt the organization. Certain controls have to be placed in order to mitigate the risks, such as access controls, being physical or non-physical. These would help us in the event of an occurrence of a risk. We can pre form a cost analysis of our plan to see what value to the company each risk has. To do that we would use a threat impact matrix, that would let us decipher our cost versus the likelihood of a risk to happen.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 Quiz

    • 419 Words
    • 2 Pages

    Develop the contingency planning policy statement. b. Conduct the business impact analysis. c. Identify preventative controls. d. Develop recovery strategies. e. Develop an IT contingency plan. f. Plan testing, training, and exercises. g. Plan maintenance.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The key elements of a disaster recovery plan are to keep computers running, meeting all agreements between customers and suppliers, and being proactive rather than reactive. Keeping the computers and systems running is an essential element to the disaster recovery plan. The systems and computers are the link to the services they provide. The business relies on the internet for their marketing or sales needs, especially in today’s world of business. Meeting the agreements between customers and suppliers is essential because they trust your business will deliver these services. Being proactive rather than reactive is always a good thing for a business to have. The employees or personnel should already know what to do when…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Training Session Handout

    • 510 Words
    • 3 Pages

    Identify countermeasures- What action needs to be taken, to ensure the problem does not happen again.…

    • 510 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Disaster Plan

    • 273 Words
    • 2 Pages

    123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Crisis Communication

    • 1315 Words
    • 6 Pages

    Business isn’t always about staying on top and trying to beat out the competition or make a name for the company. Sometimes, the issue can be simply staying afloat when harder times come. Businesses occasionally go through situations that could threaten or harm people or property, interrupt business, damage reputation or negatively impact share value. These situations make up the definition of a crisis. Every organization is vulnerable to crisis, whether that organization is large, small, successful, or just getting off the ground. Crisis is something that can determine whether a company will last or simply die out in the near future, so businesses should prepare themselves for times like these. Businesses that have failed because of crises, in the past, seemed to have lacked in proper crisis communication. Without adequate communication, operational response will break down, stakeholders usually react negatively in a confused panic, and the organization will be perceived as inept and criminally negligent (Brice). In order to better prepare for times of crisis, there are eight basic steps that have been implied by businesses that have overcome crises in the past. They require advance work in order to minimize damage, because more damaged is incurred if a business takes longer to respond to a crisis.…

    • 1315 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    PTSD To EMS Workers Essay

    • 1033 Words
    • 5 Pages

    Another solution is for the company to be more proactive instead of reactive, in effect stopping problems before they start or mitigating the impact. One example is the “First Response Resiliency” program. In short, the program teaches ongoing classes that provide strategies to help the first responder “bounce back” even before the event transpires. Coupled with a strong social support system, this program is showing signs of success.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Keys to Success in Managing a Black Swan Event (Ignore the Naysayers - It is Possible to Prepare) Nancy Green, CPCU, ARM Executive Vice President Strategic Account Management Aon Risk Solutions © 2011 – Aon Corporation 1 Keys to Success in Managing Black Swan Events Executive Summary The term “Black Swan” is on many people’s lips, and not just because the “The key to addressing lead actress in a movie by that name won an Academy Award in 2011. a Black Swan is not just While events of this type have occurred since the dawn of time, Black Swan mounting an effective gained its place in our vernacular when Nassim Nicholas Taleb, a finance response; it is mounting professor and former Wall Street trader, wrote the 2007 bestseller “The that response while Black Swan”.…

    • 5851 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Introduction ...................................................................................................... 4 1.1 Concerns around the securit y of the Internet .......................................... 4 1.2. Short discussion about IP Routing ................................................................ 5 1.2 Research activities to improve IP routing security ......................................... 7 2. Short list of IP routing attack vectors .............................................................. 9 2.1. Malicious Route Injection .............................................................................. 9 2.2. Unallocated Route Injection .......................................................................... 9 2.3. TCP Resets ................................................................................................. 10 2.4. Resource Exhaustion .................................................................................. 10 3. Measures to further secure IP routing ........................................................... 11 3.1. Protecting Router Configurations ................................................................ 11 3.2. Generalized TTL Security Mechanism (GTSM) ........................................... 12 3.3. Filtering ....................................................................................................... 12 3.4. Access Control Lists (ACLs)........................................................................ 12 3.5. Digital Signatures ........................................................................................ 13 4. Conclusion ....................................................................................................... 13 5. References…

    • 5094 Words
    • 21 Pages
    Powerful Essays